0. For each question, please provide references (links etc.) for your answers. Some links you might want to take a look at are at the bottom of this document. 1. Identify the ransomware. a. Explain how you would identify the ransomware (What tools would you use? What uniquely identifies the ransomware?). Please identify more than just the message! b. Explain how this type of ransomware works. 2. Describe the symptoms of the ransomware. a. What does it attack? b. How will it impact the business? 3. Explain how the ransomware is distributed. 4. How do we isolate the network infection? 5. Is it possible to remove the infection? 6. How do you respond to ransomware? What steps should you take? 7. How does a business protect itself from ransomware? 8. In what case, would a business pay the ransomware? Some References for Petya and WannaCry ransomware. We hope you find similar for your ransomware. https://heimdalsecurity.com/blog/ransomware-decryption-tools/ https://upload.wikimedia.org/wikipedia/en/1/18/Wana_Decrypt0r_screenshot.png https://blog.malwarebytes.com/threat-analysis/2016/04/petya-ransomware/ https://www.us-cert.gov/ncas/alerts/TA17-181A https://www.symantec.com/blogs/threat-intelligence/petya-ransomware-wiper https://www.2-spyware.com/remove-petya-virus.html https://www.us-cert.gov/ncas/alerts/TA17-181A ttps://thehackernews.com/2017/05/wannacry-ransomware-decryption-tool.html https://www.zdnet.com/article/petya-ransomware-free-decryption-tool-released-for-original-versions-of-this-nasty-malware/ https://fsrm.experiant.ca/